CVE-2007-4723
CVSS V2 High 7.5
CVSS V3 None
Description
Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
Overview
- CVE ID
- CVE-2007-4723
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2007-09-05T19:17:00
- Last Modified Date
- 2020-11-16T20:48:08
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:ragnarok_online_control_panel_project:ragnarok_online_control_panel:4.3.4a:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 7.5
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 6.4
References
Reference URL | Reference Tags |
---|---|
http://securityreason.com/securityalert/3100 | Third Party Advisory |
http://osvdb.org/45879 | Broken Link |
http://www.securityfocus.com/archive/1/478263/100/0/threaded | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2007-4723 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4723 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 16:19:43 | Added to TrackCVE |